General

  • Target

    7b3d6224d8a3713471864c85b8834a4d_JaffaCakes118

  • Size

    166KB

  • Sample

    240528-bwc4qsag56

  • MD5

    7b3d6224d8a3713471864c85b8834a4d

  • SHA1

    0cd00ace020606adfa5046e0e9f518690f403bf3

  • SHA256

    77f8df8ed8c7655aec8a386465bcd2c649350671f9400af3711a335fbc1c8c97

  • SHA512

    e1436b50a5be499b69c33166cf09f3f77a57f0e2f712b679ede0e52b8fbae278c31e447297ec151428e4de44fe4026f9f97317c9a9947dc089ee235fc9250057

  • SSDEEP

    3072:MJMawtnGqtWoKeZ9fh1CgnNto6jfvEIDiOA:Ww9vteqJggn7oUfpD

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$Fgami1SS.9fXCxu4qc3QrO6vZjcK2HvdBS8qZI5UpQfuifH0kXAdy

Campaign

3764

Decoy

ampisolabergeggi.it

podsosnami.ru

todocaracoles.com

shiresresidential.com

presseclub-magdeburg.de

odiclinic.org

highlinesouthasc.com

atalent.fi

verifort-capital.de

makeurvoiceheard.com

aakritpatel.com

insidegarage.pl

schlafsack-test.net

figura.team

tecnojobsnet.com

fax-payday-loans.com

bigler-hrconsulting.ch

sportverein-tambach.de

xn--fn-kka.no

platformier.com

Attributes
  • net

    true

  • pid

    $2a$10$Fgami1SS.9fXCxu4qc3QrO6vZjcK2HvdBS8qZI5UpQfuifH0kXAdy

  • prc

    encsvc

    tbirdconfig

    mspub

    thunderbird

    mydesktopservice

    xfssvccon

    excel

    synctime

    ocomm

    visio

    infopath

    mydesktopqos

    ocssd

    sqbcoreservice

    outlook

    wordpad

    dbsnmp

    steam

    isqlplussvc

    oracle

    firefox

    ocautoupds

    powerpnt

    agntsvc

    msaccess

    onenote

    sql

    thebat

    dbeng50

    winword

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    3764

  • svc

    svc$

    memtas

    mepocs

    sophos

    sql

    veeam

    vss

    backup

Targets

    • Target

      7b3d6224d8a3713471864c85b8834a4d_JaffaCakes118

    • Size

      166KB

    • MD5

      7b3d6224d8a3713471864c85b8834a4d

    • SHA1

      0cd00ace020606adfa5046e0e9f518690f403bf3

    • SHA256

      77f8df8ed8c7655aec8a386465bcd2c649350671f9400af3711a335fbc1c8c97

    • SHA512

      e1436b50a5be499b69c33166cf09f3f77a57f0e2f712b679ede0e52b8fbae278c31e447297ec151428e4de44fe4026f9f97317c9a9947dc089ee235fc9250057

    • SSDEEP

      3072:MJMawtnGqtWoKeZ9fh1CgnNto6jfvEIDiOA:Ww9vteqJggn7oUfpD

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks